The separation of the control plane from the data plane of a switch enables abstraction of a network through a logically centralized controller. The controller functions as the “brain” of a software-defined network. However, centralized control draws attackers to exploit different network devices by hijacking the controller. Security was initially not a key characteristic of SDN archit...
View full abstract»

Currently, different forms of ransomware are increasingly threatening Internet users. Modern ransomware encrypts important user data, and it is only possible to recover it once a ransom has been paid. In this article we show how software-defined networking can be utilized to improve ransomware mitigation. In more detail, we analyze the behavior of popular ransomware — CryptoWall — and,...
View full abstract»

In recent years, there have been an increasing number of attacks on networks, such as the distributed denial-of-service attack. However, the traditional network is not sufficiently flexible to control the huge amount of traffic that now passes through an intrusion detection system. With SDN, which separates control planes and data planes for programmability, elasticity, and simplicity, it becomes ...
View full abstract»

Software defined networking greatly simplifies network management by decoupling control functions from the network data plane. However, such a decoupling also opens SDN to various denial of service attacks: an adversary can easily exhaust network resources by flooding short-lived spoofed flows. Toward this issue, we present a comprehensive study of DoS attacks in SDN, and propose multi-layer fair ...
View full abstract»

Personal devices contain electronic evidence associated with the behavior of their owners and other devices in their environment, which can help clarify the facts of a cyber-crime scene. These devices are usually analyzed as containers of proof. However, it is possible to harness the boom of personal devices to define the concept of digital witnesses, where personal devices are able to actively ac...
View full abstract»

Packet recording or capturing is one of the most useful tools for network forensics and surveillance. Since a storage system is of a limited size, de-duplication can be used to save disk space. In this article, we present a new scalable de-duplication engine for packet recording that can eliminate redundant contents over multiple packets. Unlike previous work, our proposed scheme is designed for p...
View full abstract»

The advanced idea of machine-to-machine technology has attracted a new period of network revolution, evolving into a method to monitor and control global industrial user assets, machines, and the production process. M2M networks are considered to be the intelligent connection and communication between machines. However, the security issues have been further amplified with the development of M2M ne...
View full abstract»

Wireless networks are increasingly being employed to transfer highly sensitive information. Due to the broadcast nature of wireless channels, security issues have been taken as a critical role in wireless communications. A promising direction toward achieving secure wireless communications is physical-layer security, which is an approach exploiting the randomness of wireless channels to ensure sec...
View full abstract»

Cognitive radio is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security is a very important but not well addressed issue in CR networks. In this article we focus on security problems arising from primary user emulation (PUE) attacks in CR...
View full abstract»

Reliability is an important feature in the design and maintenance of a large-scale network. In this article, the reliability of information transmission between a transmitter and a receiver (i.e., a two-terminal network) is considered as a generalized connectivity framework of terminal nodes. As network complexity increases, existing approaches to reliability analysis are encountering significant ...
View full abstract»

Visible light communication has gained tremendous attention recently and has become a favorable complementary technology to millimeter- wave communication in short-range communication scenarios for future 5G networks. VLC possesses a number of prominent features to address the highly demanding 5G system requirements for high capacity, high data rate, high spectral efficiency, high energy efficienc...
View full abstract»

5G network architecture and its functions are yet to be defined. However, it is generally agreed that cloud computing, network function virtualization (NFV), and software defined networking (SDN) will be key enabling technologies for 5G. Indeed, putting all these technologies together ensures several advantages in terms of network configuration flexibility, scalability, and elasticity, which are h...
View full abstract»

Mobile crowdsourcing has shown great potential to address problems with large scale by outsourcing tasks to pervasive smartphone users. Smartphone users will join a crowdsourcer if they can receive satisfying rewards. In a mobile crowdsourcing market, smartphone users have free choice of crowdsourcers, and multiple crowdsourcers will interact with the rest of the market to share the limited smartp...
View full abstract»